Understand Microsoft 365 vulnerability management and security monitoring

Beginner
Auditor
Risk Practitioner
Privacy Manager
Microsoft 365

Learn how Microsoft 365 proactively monitors information system assets for vulnerabilities, assesses the risks associated with discovered vulnerabilities, and remediates them in a timely manner.

Learning objectives

Upon completion of this module, you should be able to:

  • Describe Microsoft’s Assume Breach strategy in the context of vulnerability management and security monitoring.
  • Explain machine state scanning and the components of PAVC in Microsoft 365.
  • Describe how Microsoft 365 proactively patches its systems.
  • List how Microsoft 365 anti-malware tools detect and prevent malware execution.
  • Explain how Microsoft 365 detects and remediates vulnerabilities and security misconfigurations.
  • Describe how Microsoft 365 uses security monitoring to detect and respond to attacks at scale.
  • List the attack simulation and penetration testing activities used to validate the security posture of Microsoft 365.

Prerequisites

None